| 0 | -- | 0 | Tao Tan, LiMing Zhang, Shuaikang Liu, Lei Wang. An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map |
| 0 | -- | 0 | Suryya Farhat, Manoj Kumar, Anshul Srivastava, Shilpi Bisht, Vinay Rishiwal, Mano Yadav. Enhancing E-Healthcare Data Privacy Through Efficient Dual Signature on Twisted Edwards Curves Encryption Decryption |
| 0 | -- | 0 | Victor R. Kebande, Richard Adeyemi Ikuesan. Standardizing Industrial Internet of Things (IIoT) Forensic Processes |
| 0 | -- | 0 | Mohd Shadab, Md Saquib Jawed, Mohammad Sajid. Substitution Box Construction Using Transfer-Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach |
| 0 | -- | 0 | Ehtesham Safeer, Sidra Tahir, Asif Nawaz, Mamoona Humayun, Momina Shaheen, Maqbool Khan. Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning |
| 0 | -- | 0 | Changrong Li, Wei Duan, Zhenfu Li. Deep Learning-Based Community Detection Attack: Arctic Shipping Data as a Case |
| 0 | -- | 0 | Bhomik M. Gandhi, Shruti B. Vaghadia, Malaram Kumhar, Rajesh Gupta 0007, Nilesh Kumar Jadav, Jitendra Bhatia, Sudeep Tanwar, Abdulatif Alabdulatif. Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics |
| 0 | -- | 0 | Liang Chen, Cheng Zeng, Stilianos Vidalis, Wei Jie. Managing Obligation Delegation: Incentive Model and Experiment |
| 0 | -- | 0 | Gagan Dangwal, Mohammad Wazid, Sarah Nizam, Vinay Chamola, Ashok Kumar Das. Automotive Cybersecurity Scheme for Intrusion Detection in CAN-Driven Artificial Intelligence of Things |
| 0 | -- | 0 | Shyam R. Sihare. Guided and unguided approaches for quantum key distribution for secure quantum communication |
| 0 | -- | 0 | Rasim Alguliyev, Ramiz Shikhaliyev. Computer Networks Cybersecurity Monitoring Based on Deep Learning Model |
| 0 | -- | 0 | Dhananjay Kumar Singh, Diwakar Bhardwaj. An EAADE: Effective Authentication Approach for Data Exchange in Vehicular Social Network for IoV |
| 0 | -- | 0 | Mohammad Wazid, Shivansh Nautiyal, Ashok Kumar Das, Sachin Shetty, SK Hafizul Islam. A Secure Authenticated Healthcare Data Analysis Mechanism in IoMT-Enabled Healthcare |
| 0 | -- | 0 | Elham Asadi, Soodeh Hosseini. Modeling of Malware Propagation Under the Clustering Approach in Scale-Free Networks |
| 0 | -- | 0 | Maciej Rys, Agata Slusarek, Krzysztof Zielinski. Caught Off Guard: When Experts Fall for Quishing, Is Awareness Enough? |
| 0 | -- | 0 | Doina Gavrilov. Exploring Novel Frontiers in Online Privacy Ethics |
| 0 | -- | 0 | Shuhui Su, Yonghan Luo, Tao Li, Qi Chen, Juntao Liang. Anti-Leakage Method of Sensitive Information of Network Documents Based on Differential Privacy Model |
| 0 | -- | 0 | Abdallah Alshantti, Adil Rasheed, Frank Westad. Privacy Re-Identification Attacks on Tabular GANs |
| 0 | -- | 0 | R. Shashidhara, Renju C. Nair, Pavan Kumar Panakalapati. Promise of Zero-Knowledge Proofs (ZKPs) for Blockchain Privacy and Security: Opportunities, Challenges, and Future Directions |
| 0 | -- | 0 | Jun-Won Ho. Game Theoretic Approach Toward Detection of Input-Driven Evasive Malware in the IoT |
| 0 | -- | 0 | Reza Mohammadi 0005, Mohammad Mehdi Hosseini, R. Bahrami. Uncovering security vulnerabilities through multiplatform malware analysis |
| 0 | -- | 0 | Nitin Rathore, Aparna Kumari, Margi Patel, Alok Chudasama, Dhyey Bhalani, Sudeep Tanwar, Abdulatif Alabdulatif. Synergy of AI and Blockchain to Secure Electronic Healthcare Records |
| 0 | -- | 0 | Raja Sekar Jayaram, Dinesh Balajothi, Deepu Natchirajan. Improved Mobile Security Based on Two-Factor Authentication |
| 0 | -- | 0 | Mehdi Darbandi, Ali Ehsani, Farzad Bahrami, Elham Moghadamnia, Karlo Abnoosian, Bayan Omar Mohammed. A New Feature-Based Biometric Identification System in IoT-Powered Smart Cities Using a Hybrid Optimization Algorithm |
| 0 | -- | 0 | Shipra Ravi Kumar, Mukta Goyal. Design of an Iterative Method for Blockchain Optimization Incorporating DeepMiner and AnoBlock |
| 0 | -- | 0 | Yunus Emre Göktepe, Yusuf Uzun. IDDLE: A Novel Deep Learning-Based Approach for Intrusion Detection Problem Using Feature Extraction |
| 0 | -- | 0 | Mohamed Ilies Taleb, Mustapha Benssalah. UAV Jamming Localization Against Random Eavesdropper Positions Using Cuckoo Search Algorithm |
| 0 | -- | 0 | Rajendra Prasad Nayak, Sourav Kumar Bhoi, Kshira Sagar Sahoo, Srinivas Sethi, Subasish Mohapatra, Monowar H. Bhuyan. Unveiling Sybil Attacks Using AI-Driven Techniques in Software-Defined Vehicular Networks |